{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:49:15Z","timestamp":1764874155958,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62172240","62222208"],"award-info":[{"award-number":["62172240","62222208"]}]},{"name":"Natural Science Foundation of Tianjin, China","award":["21JCZDJC00190"],"award-info":[{"award-number":["21JCZDJC00190"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678919","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"674-692","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9899-0322","authenticated-orcid":false,"given":"Ziyi","family":"Huang","sequence":"first","affiliation":[{"name":"College of Cyber Science, Nankai University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1667-2237","authenticated-orcid":false,"given":"Ding","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Cyber Science, Nankai University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2399-1532","authenticated-orcid":false,"given":"Yunkai","family":"Zou","sequence":"additional","affiliation":[{"name":"College of Cyber Science, Nankai University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. 1 in 5 Websites Still Use SHA-1: Report. https:\/\/bit.ly\/3Y7ks6S."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. neural_network_cracking. https:\/\/bit.ly\/4f9Xi5R."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. PassGAN. https:\/\/github.com\/brannondorsey\/PassGAN."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. A quarter of major CMSs use outdated MD5 as the default password hashing scheme. https:\/\/zd.net\/46dltMI."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. compiled_pcfg. https:\/\/github.com\/lakiw\/compiled-pcfg."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. OMEN. https:\/\/github.com\/RUB-SysSec\/OMEN."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. adams. https:\/\/github.com\/TheAdamProject\/adams."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. pcfg-manager. https:\/\/github.com\/Dasio\/pcfg-manager."},{"key":"e_1_3_2_1_9_1","unstructured":"2023. 7 Million Users Possibly Impacted by Freecycle Data Breach. https:\/\/bit.ly\/4cO86EZ."},{"key":"e_1_3_2_1_10_1","unstructured":"2023. Crack Me If You Can Contest. https:\/\/contest-2023.korelogic.com\/intro.html."},{"key":"e_1_3_2_1_11_1","unstructured":"2023. John the Ripper. https:\/\/github.com\/openwall\/john."},{"key":"e_1_3_2_1_12_1","unstructured":"2023. Korelogic\u2019s CMIYC Write-up. https:\/\/blog.cynosureprime.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2023. Team hashcat event writeups and tools. https:\/\/bit.ly\/3Ye5Jaf."},{"key":"e_1_3_2_1_14_1","unstructured":"2023. Topgolf Callaway Brands hacked over a million golfers exposed. https:\/\/bit.ly\/3ShkK7A."},{"key":"e_1_3_2_1_15_1","unstructured":"2024. 20 million Cutout.Pro user records leaked on data breach forum. https:\/\/bit.ly\/3y55ZOc."},{"key":"e_1_3_2_1_16_1","unstructured":"2024. CUDA C Programming Guide. https:\/\/bit.ly\/3A0rQqs."},{"key":"e_1_3_2_1_17_1","unstructured":"2024. Does the PCI-Express speed have any influence on cracking speed?https:\/\/bit.ly\/3J9X4wM."},{"key":"e_1_3_2_1_18_1","unstructured":"2024. hashcat. https:\/\/github.com\/hashcat\/hashcat."},{"key":"e_1_3_2_1_19_1","unstructured":"2024. Hashcat Plugin Development Guide. https:\/\/bit.ly\/49rF8bD."},{"key":"e_1_3_2_1_20_1","unstructured":"2024. How to create more work for full speed?https:\/\/bit.ly\/3JcwGCw."},{"key":"e_1_3_2_1_21_1","unstructured":"2024. Is piping a wordlist slower than reading from file?https:\/\/bit.ly\/3xujoi4."},{"key":"e_1_3_2_1_22_1","unstructured":"2024. Mask Attack. https:\/\/hashcat.net\/wiki\/doku.php?id=mask_attack."},{"key":"e_1_3_2_1_23_1","unstructured":"2024. pcfg_cracker. https:\/\/github.com\/lakiw\/pcfg_cracker."},{"key":"e_1_3_2_1_24_1","unstructured":"2024. Rule-based Attack. https:\/\/bit.ly\/4cRj8tf."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623156"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17146-8_16"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_10"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23240"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_11"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2428671"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_34"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3217002"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00070"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. USENIX SEC","author":"Melicher William","year":"2016","unstructured":"William Melicher, Blase Ur, 2016. Fast, lean and accurate: Modeling password guessability using neural networks. In Proc. USENIX SEC 2016. 175\u2013191."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_11"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102168"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.011"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.917757"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00056"},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. USENIX SEC","author":"Pasquini Dario","year":"2021","unstructured":"Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, 2021. Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. In Proc. USENIX SEC 2021. 821\u2013838."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00016"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1162"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_19"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. USENIX SEC","author":"Wang Ding","year":"2019","unstructured":"Ding Wang, Ping Wang, Debiao He, 2019. Birthday, name and bifacial-security: understanding passwords of Chinese web users. In Proc. USENIX SEC 2019. 1537\u20131555."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"e_1_3_2_1_51_1","first-page":"983","article-title":"Pass2Edit","volume":"2023","author":"Wang Ding","year":"2023","unstructured":"Ding Wang, Yunkai Zou, Yuan-An Xiao, 2023. Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords. In Proc. USENIX SEC 2023. 983\u20131000.","journal-title":"A Multi-Step Generative Model for Guessing Edited Passwords. In Proc. USENIX SEC"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. USENIX SEC","author":"Wang Ding","year":"2023","unstructured":"Ding Wang, Yunkai Zou, Zijian Zhang, 2023. Password guessing using random forest. In Proc. USENIX SEC 2023. 965\u2013982."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"},{"volume-title":"Using Probabilistic Techniques to Aid in Password Cracking Attacks. Ph.\u00a0D. Dissertation","author":"Weir Charles\u00a0Matthew","key":"e_1_3_2_1_54_1","unstructured":"Charles\u00a0Matthew Weir. 2010. Using Probabilistic Techniques to Aid in Password Cracking Attacks. Ph.\u00a0D. Dissertation. Florida State University."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15777-6_10"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2940877"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484743"},{"key":"e_1_3_2_1_59_1","volume-title":"Proc. USENIX SEC","author":"Xu Ming","year":"2023","unstructured":"Ming Xu, Jitao Yu, Xinyi Zhang, 2023. Improving real-world password guessing attacks via bi-directional transformers. In Proc. USENIX SEC 2023. 1001\u20131018."},{"volume-title":"From the Quest to Replace Passwords towards Supporting Secure and Usable Password Creation. Ph.\u00a0D. Dissertation","author":"Zimmermann Verena","key":"e_1_3_2_1_60_1","unstructured":"Verena Zimmermann. 2021. From the Quest to Replace Passwords towards Supporting Secure and Usable Password Creation. Ph.\u00a0D. Dissertation. Technical University of Darmstadt."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.08.006"}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '24","location":"Padua Italy"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":61,"alternative-id":["10.1145\/3678890.3678919","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678919","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}